ARTICLES

Why Cryptocurrency Mining Tops New Cyberthreat

According to a new cyber security report, cryptocurrency mining malware is on the rise in addition to the ransomware attacks. On this latest cyber...

Checklist of Secure Email Compliance of GDPR – 2

Continued... Access Restrictions: Email Access Restriction feature should be implemented that allows admin to control users access to mails through multiple settings. It should prevent...

Checklist of Secure Email Compliance of GDPR – 1

This year in May, General Data Protection Regulation came into full effect, but only a few are familiar with the basic email technical compliance...

Intricacies of Digital Forensics & Incident Response

Opting for digital forensics as a career has a promising future in the Industry and government services. Let's get to know the modern way...

NEWS

Fortinet Introduces ML Capabilities to its FortiWeb Web Application Firewall

Fortinet Introduces Machine Learning Capabilities to its FortiWeb Web Application Firewall for Advanced Behavioral Threat Detection Two-step AI-based Machine Learning Improves Attack Detection Accuracy to...

Cyberbit Raises $30 Million Investment from Claridge Israel

Cyberbit Ltd., a subsidiary of Elbit Systems Ltd., and a leading provider of cyber range training and simulation platforms, and provider of IT/OT threat...

Check Point Researchers Discover Cyber-Criminals Exploiting World Cup Fever

Check Point Researchers Discover Cyber-Criminals Exploiting World Cup Fever with Wallchart Phishing Campaign New phishing scheme exploits victims by downloading an infected FIFA World Cup...

Chinese hacker group LuckyMouse found targeting national data center

Source: CYWARE | By Samantha Black Chinese hacker group LuckyMouse found targeting national data center in Central Asia One of the most prolific Chinese hacker groups...

INTERVIEWS

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...